E-Mail Rules: A Business Guide to Managing Policies, Security, and Legal Issues for E-Mail and Digital Communication

Overview

"All companies rely on e-mail as a critical business tool, but few have considered the policies and systems necessary to safeguard their interests. Important information including transaction details, trade secrets, and confidential documents contained within messages are business assets with serious legal and financial implications. If an organization is to be safe, it needs a practical system for handling everything that comes into—and leaves—its computers. A toolkit for protecting any company’s electronic ...

See more details below
Available through our Marketplace sellers.
Other sellers (Hardcover)
  • All (21) from $1.99   
  • New (2) from $12.86   
  • Used (19) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$12.86
Seller since 2014

Feedback rating:

(576)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new. 1st Edition. 2003 Paperback.

Ships from: North Wales, PA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$50.00
Seller since 2014

Feedback rating:

(139)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

"All companies rely on e-mail as a critical business tool, but few have considered the policies and systems necessary to safeguard their interests. Important information including transaction details, trade secrets, and confidential documents contained within messages are business assets with serious legal and financial implications. If an organization is to be safe, it needs a practical system for handling everything that comes into—and leaves—its computers. A toolkit for protecting any company’s electronic capital, E-Mail Rules shows how to:

• Use technology, policy, and employee training to minimize the loss of data

• Create enterprise-wide retention rules for the saving and disposal of messages

• Gain control of transmission and ensure a secure electronic environment

• Develop strategies for related technologies like instant messaging, list serves, and online chat

E-Mail Rules shows readers how to maximize the effectiveness of their organizations’ e-mail systems, and put an end to lost or compromised information."

Read More Show Less

Editorial Reviews

From the Publisher

Business Law Today: ""A well-organized guide to implementing e-mail risk management.Rather than a legal treatise, this is a book the lawyer may read to communicate with clients; or the general counsel reads and suggests that the outside lawyer, officers, CTO and head of HR read, so they can all be on the same page. Protection of e-mail records and systems is a complex interdisciplinary efforts, and this book can help get to common ground."""

Library Journal
Good advice abounds for executives, managers, and line employees.
ComputerWorld
This delightful book contains 36 rules of e-mail management- simple nuggets of information that bring together a clear policy on how to protect your company from the expenses, legal repercussions, and damage to its reputation that could arise from having an e-mail system.... I heartily recommend this book to anyone responsible for the outcomes of poorly managed e-mail systems, be they in IT security, human resources or other areas of management.— July 21, 2003
Business Law Today
"A well-organized guide to implementing e-mail risk management?.Rather than a legal treatise, this is a book the lawyer may read to communicate with clients; or the general counsel reads and suggests that the outside lawyer, officers, CTO and head of HR read, so they can all be on the same page. Protection of e-mail records and systems is a complex interdisciplinary efforts, and this book can help get to common ground."
Online
If you worry about liability and compliance with the law, this book provides the "rules" you need to implement in your organization to control e-mail use and abuse.
Library Journal
At first glance, this title does not seem to speak to risk management. Nevertheless, e-policy expert and author Flynn (The E-Policy Handbook; Writing Effective E-Mail), along with attorney Kahn, has created a handy e-risk management tool for companies. With its liabilities lying precisely in its strengths-instant, ubiquitous, electronic communication-e-mail carries the potential for indiscretion, misuse, and abuse. The authors make a solid case for taking a holistic approach to e-mail management, covering the gamut from appropriate e-mail conduct to the legal and practical issues of records management, e-mail security, and employee e-policy education. This text is written in handbook format, making it easy to navigate, find quick tips, and get an overview of each concept. Topics such as cybertheft, employee "netiquette," and using e-mail business records as legal evidence come alive with real-world examples and (often) horror stories. Good advice abounds for executives, managers, and line employees. And a healthy dose of egalitarianism appears here as well: policies need to apply across the board to be fair, effective, intelligible, and enforceable. Recommended for all business collections.-Carol J. Elsen, Univ. of Wisconsin Lib., Whitewater Copyright 2003 Reed Business Information.
Read More Show Less

Product Details

  • ISBN-13: 9780814471883
  • Publisher: AMACOM
  • Publication date: 4/15/2003
  • Pages: 256
  • Product dimensions: 6.08 (w) x 8.98 (h) x 0.90 (d)

Meet the Author

Nancy Flynn (Columbus, OH) is the author of The ePolicy Handbook (0-8144-7091-2) and Writing Effective E-Mail Randolph Kahn, Esq. (Highland Park, IL) is an internationally recognized expert on the legal, risk management, and policy issues of information management.

Read More Show Less

Table of Contents

"Preface

Part 1: The Case for E-Mail Management

1. Introduction

2. Real-World Legal Issues

3. E-Mail Ownership and Cybertheft

Part 2: Designing and Implementing Effective E-Mail Policies

4. Why Implement E-Mail Policies?

5. E-Mail Privacy

6. E-Mail Content

7. Netiquette

8. Special Netiquette Considerations for Managers

9. LISTSERV ® Policy

10. Corporate Road Warriors

11. Failure to Establish or Enforce Policy

Part 3: Retaining E-Mail Business Records

12. Retaining Business Records: The Legal Foundation for E-Mail

13. E-Mail Business Record Retention

14. Developing Retention Rules

15. SEC and NASD Regulations

16. Record Retention Versus Backup Tapes or Stored E-Mail

17. Software Solutions

18. Outsourcing E-Mail Storage and Retention

19. Educating Employees About E-Mail Retention

Part 4: E-Mail Business Records as Legal Evidence

20. E-Mail Business Records as Legal Evidence

21. Records Management

22. E-Mail Discovery

23. Destruction of Evidence

24. Discovery Rules for Employees

25. Creating an E-Discovery Response Strategy

Part 5: E-Mail Security

26. E-Mail Security

27. Physical and Network Security

28. Content Security — Inbound

29. Content Security — Outbound

30. E-Mail System Security

31. Spam

Part 6: Mixed Messages: Managing Alternative Communications Technologies

32. Instant Messaging

33. Other Communications Technologies

34. Peer-to-Peer File Networking Technology

35. E-Mail Variations

Part 7: Employee Education

36. Training Is Key to E-Risk Management Success

37. Instilling a Sense of Ownership in Employees"

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)